CISA adds CVE-2022-30525 flaw in Zyxel Firewalls to its Known Exploited Vulnerabilities Catalog
US Critical Infrastructure Security Agency (CISA) adds critical CVE-2022-30525 RCE flaw in Zyxel Firewalls to its Known Exploited Vulnerabilities Catalog
The U.S. Cybersecurity and Infrastructure Security Agency added the recently disclosed remote code execution bug, tracked as CVE-2022-30525, affecting Zyxel firewalls, to its Known Exploited Vulnerabilities Catalog.
According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.
Experts recommend also private organizations review the Catalog and address the vulnerabilities in their infrastructure.
Last week, Zyxel has addressed the critical CVE-2022-30525 (CVSS score: 9.8) affecting Zyxel firewall devices that enables unauthenticated and remote attackers to gain arbitrary code execution as the “nobody” user.
The vulnerability was discovered by Rapid7 which reported it on April 13. Zyxel silently addressed the flaw by releasing security updates on April 28, 2022, Rapid7 pointed out that this choice leaves defenders in the dark and only advantages the attackers.
“The affected models are vulnerable to unauthenticated and remote command injection via the administrative HTTP interface. Commands are executed as the nobody user.” reads the report published by Rapid7.
Below is the list of vulnerable products and related patches:
|AFFECTED MODEL||AFFECTED FIRMWARE VERSION||PATCH AVAILABILITY|
|USG FLEX 100(W), 200, 500, 700||ZLD V5.00 through ZLD V5.21 Patch 1||ZLD V5.30|
|USG FLEX 50(W) / USG20(W)-VPN||ZLD V5.10 through ZLD V5.21 Patch 1||ZLD V5.30|
|ATP series||ZLD V5.10 through ZLD V5.21 Patch 1||ZLD V5.30|
|VPN series||ZLD V4.60 through ZLD V5.21 Patch 1||ZLD V5.30|
According to Rapid 7, there are more than 15,000 internet-facing vulnerable systems tracked by the Shodan search engine. The researchers also developed a Metasploit module for this issue and published a video PoC of the attack:
“Apply the vendor patch as soon as possible. If possible, enable automatic firmware updates. Disable WAN access to the administrative web interface of the system.” concludes the report.
Researchers at Shadowserver Foundation reported they started observing exploitation attempts of CVE-2022-30525 starting on May 13th. The experts claim that at least 20 800 of the potentially affected Zyxel firewall models (by unique IP) are exposed online, the majority of the CVE-2022-30525 affected models are in the EU – France (4.5K) and Italy (4.4K) and the US (2.4K).
Cisa also added the CVE-2022-22947 code injection vulnerability in Spring Cloud Gateway to the catalog. A remote attacker could send specially-crafted requests to vulnerable systems to gain arbitrary code execution. Last week, Microsoft experts reported that the Sysrv-K botnet is exploiting this issue to take over the vulnerable web servers.
Both issues have to be addressed by federal agencies by June 6.
Suggest an edit to this article
Go to Cybersecurity Knowledge Base
Got to the Latest Cybersecurity News
Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for our Weekly Cybersecurity Newsletter Today.
Remember, CyberSecurity Starts With You!
- Globally, 30,000 websites are hacked daily.
- 64% of companies worldwide have experienced at least one form of a cyber attack.
- There were 20M breached records in March 2021.
- In 2020, ransomware cases grew by 150%.
- Email is responsible for around 94% of all malware.
- Every 39 seconds, there is a new attack somewhere on the web.
- An average of around 24,000 malicious mobile apps are blocked daily on the internet.
- Twitter discontinues text message two-factor authentication for non-Blue subscribers - 26 March 2023
- A Beginner’s Guide to Visual Studio Code: Interface, Features, Keyboard Shortcuts and More - 25 March 2023
- A Lesson in Privacy: The ChatGPT Bug and Its Implications for AI Conversations - 24 March 2023